Identity and Access Management Services. G-Cloud 7

Size: px
Start display at page:

Download "Identity and Access Management Services. G-Cloud 7"

Transcription

1 Identity and Access Management Services G-Cloud 7

2 Who We Are Kainos is one of the longest standing independent digital technology companies in UK. We provide digital technology solutions that enable companies to work smarter, faster, better. We re agile and creative, and always on top of the latest technologies and trends.

3 700 + Staff years global customers We employ more than 700 staff in the UK, Poland and Ireland, directly supporting the technology needs for over 150 global customers, in government, healthcare and financial services. We have long-standing and mutuallysatisfying relationships with our many customers around the world.

4 Our Work in Government 20 years We ve been working for over 20 years in the UK public sector for various organisations including local authorities, hospitals and central government departments. Kainos has been part of the Government Digital Services Digital by Default programme from the start, and has worked on over 40 digital projects across government. 40 8

5 We ve worked on digital services that are now available to millions of UK citizens, including drivers, farmers, MOT testers and voters.

6 Kainos and the UK Government Digital Programmes Kainos is heavily involved in the UK government s initiative to transform public services by making them easier to use, transparent and online. We use the GDS Digital by Default design principles, which place user needs at the heart of everything.

7 We use open source technologies and agile methodologies to develop efficient and elegant digital solutions.

8 Kainos and our Digital Transformation Projects Kainos is extending the boundaries 07 We ve been involved in 7 of the 25 exemplar projects and together with our customer departments we re extending the boundary of what is possible. 25 We are recognised as Digital Industry Leaders

9 Firsts We worked on the first government digital service to deploy application and data in the cloud. We are the first supplier to make use of the UK government s new Identity Assurance service, which verifies a citizen s identity and makes online services more secure. We were the first to deliver a major government transactional service for the Cabinet Office, all the way from discovery to live operation as an agile project.

10 Our Digital Delivery Experience We solve complex digital problems of scale and build smarter, faster, better services for users that enable organisational transformation beyond technology DVLA Driving License Cabinet Office Register to Vote DVSA MOT Modernisation Enabling Drivers in Great Britain to access Driving records online. Simplifying voter registration in England and Wales by bringing it online Disrupting the UK MOT industry through digital 500 million 45million users yearly transactions 9,218,788 online applications in million saving ,012 million users single day sign-ups peak 55,000 testers million tests garages

11 Identity Assurance and Access Management Our Identity Assurance and Access Management (IDAM) service provides Government with expert advice on maintaining customer privacy and data security. We offer an open ended engagement focused on helping you to understand how best to confirm the identity of people accessing your service and ensuring information is safe. Features 1. Expert advice and guidance on meeting privacy and security standards 2. Analysis of business processes identifying those with an IDAM need 3. Categorisation of the various Identity Assurance Providers required 4. Identification of business process with a Gov.UK Verify need 5. Identification of business processes with an Assisted Assurance need 6. Identification of business processes with bespoke Identity Assurance need 7. Identification of bespoke Identity Providers that may be necessary 8. Identification of applicable Service Providers 9. Selection of best-fit Access Management products Benefits Benefits 1. Confidence in customer privacy and data security In-depth knowledge and experience of public 2. sector. Clarification of Identity Assurance & Access Flexible Management approach to needs delivery. Rapid deployment of team - on-site, remote, or a 3. combination. Guidance on incorporating Identity Assurance Ability services to off-shore into business specific activities, processes enabling competitive costs. 4. Kainos extensive Identity Assurance & Access Openness and transparency, ensuring tangible benefits Management and outcomes. experience 5. Fully Access averse to in Kainos GDS standards extensive and principles. set of wider services Input into larger transformation programmes 6. and Kainos IT strategy. proven track record in Identity Assurance & Reduce Access operational Management costs. Increase innovation. 7. Improve Vision to and service scope for users for proceeding and customers to fulfil the IDAM requirements

12 Identity Assurance and Access Management - continued The Identity Assurance and Access Management consultancy offering provides government departments and associated agencies, with an open-ended engagement focused on assisting you to identify and understand needs in the areas of Identity Assurance and Access Management. We will assist you in building the vision for your services, and guide you through the various aspects of that vision in order to clarify the key areas of scope. Kainos has extensive experience in the area of Identity Assurance and Access Management, having built and provided IDAM capabilities for numerous online services; including several of the UK Government s initial exemplar services. In addition to the consultancy offering, we provide an extensive range of services covering all aspects of Identity Assurance and Access Management. These service offering include the following: Provision of citizen-based Identity Assurance capabilities that are delivered by the UK Government s Gov.uk Verify service Provision of organisation & delegate based Identity Assurance capabilities that are delivered by bespoke Identity Providers Provision of Assisted Digital for identity Assurance where Identity Assurance capabilities are tailored to meet the specific needs of the department and associated agencies in question, building the necessary back-office capabilities in order to meet the demand. Provision of a unified Identity Assurance & Access Management solution capable of incorporating numerous differing categories of Identity Provider providing Identity Assurance for the complete set of services which they are entitled to use based upon their role. The outputs of the consultancy exercise will prepare the ground for the Discovery phase, identifying the key Identity Assurance and Access Management requirements that need to be fulfilled by the service.

13 Identity Assurance and Access Management Discovery Service Our Identity Assurance and Access Management (IDAM) discovery service provides Government with a time bound engagement (3-4 weeks) focused on preparing for an Alpha delivery phase. Our expert consultants will analyse your service and provide specialist guidance on the customer privacy and data security requirements that you ll need to address. Features 1. Expert advice and guidance on meeting privacy and security standards 2. Categorisation of the various Identity Assurance Providers (IdP) required 3. Identification of business processes with a Gov.UK Verify need 4. Identification of business processes with an Assisted Assurance need 5. Identification of business processes with bespoke Identity Assurance need 6. Identification of bespoke Identity Providers that may be necessary 7. Identification of applicable Service Providers 8. Specification of best-fit Access Management products 9. Provision of key artefacts for input to Alpha delivery phase Benefits Benefits 1. In-depth Confidence knowledge that and you experience understand of public your Identity sector. Assurance needs Flexible approach to delivery. Rapid deployment of team - on-site, remote, or a 2. Guidance on incorporating Identity Assurance combination. services into business processes Ability to off-shore specific activities, enabling competitive costs. 3. Openness Identification and transparency, of the IDAM ensuring needs tangible for input to Alpha benefits and outcomes. Fully averse in GDS standards and principles. 4. Input Service into larger delivery transformation plan for the programmes Alpha phase and IT strategy. 5. Reduce Access operational to Kainos costs. extensive set of wider services Increase innovation. Improve to service for users and customers 6. Kainos proven track record in Identity Assurance & Access Management

14 Identity Assurance and Access Management Discovery Service - continued The Kainos Identity Assurance and Access Management service discovery offering provides government departments and associated agencies with a time-bound engagement (typically aligned with the Discover phase of the Service Delivery) focused on assisting the department or associated agency to identify their Identity Assurance and Access Management requirements; and to guide the department or associated agency through the specification and design of their service to meet their Identity Assurance and Access Management requirements. During this engagement we will assist you to categorise the various differing types of Identity Provider required; from UK citizen based Gov.UK Verify to Organisation, Professional and Delegated Authority Identity Providers. We will also assist you with the identification of the roles based access requirements for each of the categories of user and identify how these might be fulfilled as part of the delivered service.

15 Government Gateway Transition Following the launch of Verify, the Government s new identity assurance service, retirement of the Government Gateway is imminent. Moving to the new service or creating an alternative can be complex, involving process and service redesign. Our experts will guide you through this change ensuring you maintain privacy and data security. Features 1. Expert advice and guidance on meeting privacy and security standards 2. Analysis of business processes identifying those with an IDAM need 3. Categorisation of the various Identity Assurance Providers required 4. Identification of business processes with a Gov.UK Verify need 5. Identification of business processes with an Assisted Assurance need 6. Identification of business processes with bespoke Identity Assurance need 7. Identification of bespoke Identity Providers that may be necessary 8. Identification of applicable Service Providers 9. Selection of appropriate Identity Providers 10.Design and delivery of services with an alternative Identity Assurance mechanism Benefits Benefits 1. Confidence that you understand your Identity In-depth Assurance knowledge needs and experience of public sector. Flexible approach to delivery. 2. Rapid Guidance deployment on incorporating of team - on-site, Identity remote, Assurance or a combination. services into business processes Ability to off-shore specific activities, enabling competitive costs. 3. Access to Kainos extensive set of wider services Openness and transparency, ensuring tangible benefits and outcomes. 4. Fully Kainos averse proven in GDS standards track record and principles. Identity Assurance & Input Access into larger Management transformation programmes and IT strategy. Reduce operational costs. 5. Start to finish service offering Increase innovation. Improve to service for users and customers 6. Elimination of dependency upon the Government Gateway service offering

16 Government Gateway Transition- continued The End-of-Life for the UK Government s Government Gateway service has already been announced; and those existing government services that rely upon the Government Gateway service in order to provide identity assurance need to transition to an alternate Identity Assurance mechanism. The applicable alternative Identity Assurance mechanisms will vary from one government department or associated agency to another; and in many cases will involve incorporation of the UK Governments Gov.UK Verify c itizen based Identity Assurance service. In other cases this will involve incorporation of alternative Identity Providers; in particular in scenarios where the Identity Assurance requirements are geared towards organisation, principle and delegated authorities. During this engagement we will assist in the identification and selection of the applicable Identity Providers, and in some scenarios there may be a need for multiple different Identity Providers; in other cases there many even also be a need to build a service specific Identity Provider. We will propose and design an Identity Assurance solution around the department s or associated organisations needs and then integrate the Identity Assurance solution into the your existing services.

17 Identity Assurance for people and organisations Knowing who is accessing your service is paramount to privacy and data security. For individuals, we can help you integrate with the Government s Verify identity assurance service. For organisations, we can provide a corporate identity assurance and access management capability designed to meet your needs for a service-specific Digital Identity. Features 1. Analysis of business processes identifying those with an IDAM need 2. Categorisation of the various Identity Assurance Providers required 3. Identification of business process with a Gov.UK Verify need 4. Identification of business process with an Assisted Assurance need 5. Identification of business process with corporate Identity Assurance need 6. Identification of business process with bespoke Identity Assurance need 7. Identification of bespoke Identity Providers that may be necessary 8. Identification of applicable Service Providers 9. Design of services with citizen and/or corporate IDAM capabilities 10.Delivery of services with citizen and/or corporate IDAM capabilities Benefits Benefits 1. Clarification of the department s Identity Assurance In-depth needsknowledge and experience of public sector. Flexible approach to delivery. 2. Rapid Guidance deployment on incorporating of team - on-site, Identity remote, Assurance or a combination. services into business processes Ability to off-shore specific activities, enabling competitive costs. 3. Access to Kainos Identity Assurance & Access Openness Management and transparency, and wider ensuring services tangible benefits and outcomes. Fully averse in GDS standards and principles. 4. Input Kainos into larger proven transformation track record programmes in Identity Assurance & and Access IT strategy. Management Reduce operational costs. Increase innovation. 5. Start to finish service offering Improve to service for users and customers 6. Incorporation of citizen and/or corporate Identity Assurance into services

18 Identity Assurance for people and organisations - continued The Kainos Citizen and/or Corporate identity Assurance offering provides government departments and associated organisations or agencies with a means of incorporating Identity Assurance capabilities into their di gital services. We will guide you through the identification of the appropriate categories of Identity Assurance required; assist with the selection of the applicable Identity Providers and incorporation of the Identity Assurance capabilities of the chosen Identity Providers into your digital services. In many cases this will involve integration of the Identity Assurance capabilities offered by the UK Government s Gov.UK Verify service into the department s or associated agency s services. In other cases this will involve incorporation of alternative Identity Providers; in particular in scenarios where the Identity Assurance requirements are geared towards organisation, principle and delegated authorities. During this engagement we will assist in the identification and selection of the applicable Identity Providers, and in some scenarios there may be a need for multiple different Identity Providers ; in other cases there many even also be a need to build a service specific Identity Provider. We will propose and design an Identity Assurance solution around the department s or associated organisations needs and then integrate the Identity Assurance solution into the your existing services.

19 Unified Identity Assurance and Access Management Our unified Identity Assurance and Access Management (IDAM) hub provides Government organisations with a single sign-on solution for multiple services. Using a distributed identity control, we will help you ensure that the right people get the right level of access, to the right services, at the right time. Features 1. Service enrolment 2. User provisioning and maintenance 3. Multiple Identity Providers, selection based upon category of user 4. Single Sign-on to available services 5. Multiple Service Providers, with availability based upon user role 6. Roles based Access Management 7. User focused Service Dashboard 8. Single point of access for all of the department s services 9. Audit of all user interactions 10. Workflow driven approvals processes Benefits Benefits 1. Centralised user provisioning/de-provisioning across In-depth department knowledge and experience of public sector. Flexible approach to delivery. 2. Rapid Centralised deployment user of team maintenance - on-site, remote, across or department a combination. Ability to off-shore specific activities, enabling 3. Controlled access to department s services competitive costs. Openness and transparency, ensuring tangible 4. benefits Verified and Identity outcomes. Assurance for all service users Fully averse in GDS standards and principles. Input into larger transformation programmes 5. and Extensible IT strategy. set of Identity Providers Reduce operational costs. 6. Increase Extensible innovation. set of Service Providers Improve to service for users and customers 7. Department wide Digital Identity for all users

20 Unified Identity Assurance and Access Management - continued The Unified Identity Assurance and Access Management offering provides Government departments and associated agencies with organisation-wide IDAM control, ensuring that the right people get the right level of access to the right services at the right time; with identity being distributed throughout all available services via Single Sign on (SSO). The core component of the offering is the Identity Assurance & Access Management hub, which enables government departments and large organisations to take control of their Identity Assurance and Access Management activities, providing the department with a single user management Portal and a central point for user provisioning. Central to the capability of the Identity Assurance and Access Management hub is the fact that the end -user s identity has already been verified to the appropriate level of assurance, before the end-user is allowed to access any of the department s secure services; by default, LOA-2 is the required the Level of Assurance (LOA). Identity Assurance is a core element of the user enrolment process, where the end-user s identity is verified (to the appropriate level) by one of a set of external Identity Providers, based upon the category of the end-user. End-users enrolling as a citizen are routed to the UK Government s Gov.UK Verify service, in order to verify their identity; whilst the department s own internal users will be routed to an Internal User Identity Provider instead. Other categories of end- user will be routed to alternative Identity Providers, and the set of available Identity Providers can be extended to accommodate other categories of end-user as required. The enrolment applications for all end-users are subject to a typical approvals process prior to being set-up as users of the system. Endusers will be notified of the outcome of this, and where applicable directed to their new Service Dashboard.

21 Unified Identity Assurance and Access Management - continued The Service Dashboard provides the end-user with centralised access to the complete set of departmental services that they have been approved to use. Access to each service couldn t be easier, there is no need for the end-user to provide service specific credentials as the end-user s identity is automatically passed to the Service Provider (SP) as a secure Single Sign-on token. When circumstances change (e.g. a change in an end-user s role) the Access Management capabilities made available to the internal users allow them to alter the end-user s role and privileges accordingly; where necessary the next time that the end-user accesses their departmental services they will be directed to the appropriate Identity Provider to re-verify their identity, in order to take account of any changes that the internal user has made. Internal users can locate the records for the end-user in question and amend any aspect of the information held. The level of information that internal users can amend ranges from an end-user s assigned roles to their identity (e.g. name, address, etc.). The internal users also have access to a mechanism for de-provisioning end-users; thus terminating the end-user s ability to use the Service Dashboard and any of the departmental services which the end- user had previously been authorised to use. Identity Assurance & Access Management Hub

22 Commercial Statement Confidentiality and Copyright Kainos Software Limited 2015 ("Kainos") The contents of this document are commercial and confidential in nature and the copyright of Kainos. This document must not be reproduced (in whole or in part) save in connection with the purpose for which it was issued. Trademarks Kainos is a registered trademark of Kainos Software Limited. All rights reserved. You may not delete or change or modify any copyright or trademark notice. Caveats Kainos has used all reasonable endeavours to ensure that the contents of this document are accurate, but is not responsible for any errors or omissions. All information provided prior to execution of a contract is provided "as is" and subject to contract without warranty of any kind. This document does not constitute an offer from Kainos. In the event that the parties elect to work together, they will only be contractually bound to each other upon signature of a contract. Corporate Information Kainos is the trading name of the Kainos group of companies, further information on which can be found here:

D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV

D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV D-G4-L4-126 Police contact management and demand reduction review Deloitte LLP Service for G-Cloud IV September 2013 Contents 1 Service Overview 1 2 Detailed Service Description 2 3 Commercials 6 4 Our

More information

White Paper. Simplify SSL Certificate Management Across the Enterprise

White Paper. Simplify SSL Certificate Management Across the Enterprise WHITE PAPER: SIMPLIFY SSL CERTIFICATE MANAGEMENT ACROSS THE ENTERPRISE White Paper Simplify SSL Certificate Management Across the Enterprise Simplify SSL Certificate Management Across the Enterprise Contents

More information

HP Identity Management for manufacturing companies

HP Identity Management for manufacturing companies HP Identity Management for manufacturing companies Be faster to market through secure access HP making identity management work HP s broad platform support and superior, standards-based architecture enabled

More information

Benefits without burden: How RIG is using NowWeComply to solve the compliance conundrum.

Benefits without burden: How RIG is using NowWeComply to solve the compliance conundrum. Benefits without burden: How RIG is using NowWeComply to solve the compliance conundrum. With NowWeComply, staffing businesses can prove to their clients that they are doing what they should be doing in

More information

The Cadence Partnership Service Definition

The Cadence Partnership Service Definition The Cadence Partnership Service Definition About Cadence The Cadence Partnership is an independent management consultancy, specialising in working with a wide range of organisations, solving complex issues

More information

Data Protection Act 1998. Guidance on the use of cloud computing

Data Protection Act 1998. Guidance on the use of cloud computing Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered

More information

Network Rail Infrastructure Projects Joint Relationship Management Plan

Network Rail Infrastructure Projects Joint Relationship Management Plan Network Rail Infrastructure Projects Joint Relationship Management Plan Project Title Project Number [ ] [ ] Revision: Date: Description: Author [ ] Approved on behalf of Network Rail Approved on behalf

More information

Managing Access for External Users with ARMS

Managing Access for External Users with ARMS Managing Access for External Users with ARMS White Paper 27 th September 2015 ProofID Limited 1 Author: Version: Status: Reference: Creation Date: Revision Date: Reviewed by: Approved by: Tom Eggleston

More information

OVERSEAS PENSIONS (DISCOVERY)

OVERSEAS PENSIONS (DISCOVERY) OVERSEAS PENSIONS (DISCOVERY) DIGITAL IDENTITY FOR AN AGEING POPULATION BY FOLA OGUNSOLA & STEVE PANNIFER OIX 2015 1 Contributors OIX UK is the UK arm of a global organisation and works closely with the

More information

When millions need access: Identity management in an increasingly connected world

When millions need access: Identity management in an increasingly connected world IBM Software Thought Leadership White Paper January 2011 When millions need access: Identity management in an increasingly connected world Best practice solutions that scale to meet today s huge numbers

More information

GLOBAL Service Desk. From Computacenter

GLOBAL Service Desk. From Computacenter From Computacenter CONTENTS 03 04 05 06 07 08 09 11 First class; all the way Great expectations Safety in numbers Choice and flexibility Our next generation service desk Why Computacenter Our customer

More information

KPMG Advisory. Microsoft Dynamics CRM. Advisory, Design & Delivery Services. A KPMG Service for G-Cloud V. April 2014

KPMG Advisory. Microsoft Dynamics CRM. Advisory, Design & Delivery Services. A KPMG Service for G-Cloud V. April 2014 KPMG Advisory Microsoft Dynamics CRM Advisory, Design & Delivery Services A KPMG Service for G-Cloud V April 2014 Table of Contents Service Definition Summary (What s the challenge?)... 3 Service Definition

More information

DOCUMATION S DOCUMENT MANAGEMENT

DOCUMATION S DOCUMENT MANAGEMENT Documation is a leading provider of document-centric workflow and content management software, delivering services and solutions to businesses and organisations in the UK, Europe and around the world.

More information

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service

More information

Memorandum to the Public Administration Select Committee

Memorandum to the Public Administration Select Committee Memorandum to the Public Administration Select Committee Government Response to the Public Administration Select Committee s report: Government and IT a recipe for rip-offs : time for a new approach: Further

More information

Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document

Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document Microsoft Services - GCloud 7 Catalogue Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document 1 Overview of the Service 1.1 Service Objectives The 2

More information

DOCUMATION S SELF-SERVICE PORTAL

DOCUMATION S SELF-SERVICE PORTAL Documation is a leading provider of document-centric workflow and content management software, delivering services and solutions to businesses and organisations in the UK, Europe and around the world.

More information

A Changing Commission: How it affects you - Issue 1

A Changing Commission: How it affects you - Issue 1 A Changing Commission: How it affects you - Issue 1 Contents Overview... 3 Change Programme... 4 Introduction... 4 Reviewing how we regulate and engage... 4 What are the key changes... 5 What does it mean

More information

Cloud Computing and Records Management

Cloud Computing and Records Management GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 srsarecordsmanagement@sa.gov.au www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version

More information

allchoice We are XMA. Empowering employee device choice within the workplace

allchoice We are XMA. Empowering employee device choice within the workplace allchoice Empowering employee device choice within the workplace We are XMA. We are XMA. We deliver innovative IT solutions that enhance how people learn, teach, govern, deliver healthcare and do business.

More information

iso20000templates.com

iso20000templates.com iso20000templates.com Public IT Limited 2011 IT Service Policy Document Ref. ITSM01001 Version: 1.0 Draft 1 Document Author: Document Owner: V 1.0 Draft 1 Page 1 of 11 Revision History Version Date RFC

More information

DOCUMENT MANAGEMENT FROM FILESTREAM

DOCUMENT MANAGEMENT FROM FILESTREAM DOCUMENT MANAGEMENT FROM FILESTREAM WORKFLOW FROM DOCUMATION The speed with which Documation was able to get to grips with Nottinghamshire Police s manual procedures before constructing and delivering

More information

Security & Privacy Current cover and Risk Management Services

Security & Privacy Current cover and Risk Management Services Security & Privacy Current cover and Risk Management Services Introduction Technological advancement has enabled greater working flexibility and increased methods of communications. However, new technology

More information

DOCUMATION S ACCOUNTS RECEIVABLE SOLUTION

DOCUMATION S ACCOUNTS RECEIVABLE SOLUTION Documation is a leading provider of document-centric workflow and content management software, delivering services and solutions to businesses and organisations in the UK, Europe and around the world.

More information

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All

More information

3.0 ACCEPTANCE OF WORK

3.0 ACCEPTANCE OF WORK Terms and Conditions All orders placed with The Web Bureau Ltd. are accepted subject to the following conditions, which shall form the basis of the contract between The Web Bureau Ltd and the customer.

More information

People-Focused Access Management. Software Consulting Support Services

People-Focused Access Management. Software Consulting Support Services People-Focused Access Management Software Consulting Support Services A beautiful experience. Anytime, anywhere. Access: One is an industry-leading Access Management platform that provides you with versatile

More information

This image cannot currently be displayed. D-G4-L4-241 Predictive analytics (software as service) Deloitte LLP Service for G-Cloud IV

This image cannot currently be displayed. D-G4-L4-241 Predictive analytics (software as service) Deloitte LLP Service for G-Cloud IV This image cannot currently be displayed. D-G4-L4-241 Predictive analytics (software as service) Deloitte LLP Service for G-Cloud IV September 2013 Contents 1 Service Overview 1 2 Detailed Service Description

More information

How much do you pay for your PKI solution?

How much do you pay for your PKI solution? Information Paper Understand the total cost of your PKI How much do you pay for your PKI? A closer look into the real costs associated with building and running your own Public Key Infrastructure and 3SKey.

More information

DOCUMATION S PURCHASE TO PAY (P2P) SUITE

DOCUMATION S PURCHASE TO PAY (P2P) SUITE Documation is a leading provider of document-centric workflow and content management software, delivering services and solutions to businesses and organisations in the UK, Europe and around the world.

More information

G-Cloud Healthcare Analytics Service. October 2015. G-Cloud. service definitions

G-Cloud Healthcare Analytics Service. October 2015. G-Cloud. service definitions G-Cloud Healthcare Analytics Service October 2015 G-Cloud service definitions TABLE OF CONTENTS Service Overview... 3 Business Need... 5 Our Approach... 6 Service Management... 6 Sub-contractors... 7 Pricing...

More information

Digital Britain One: Shared infrastructure and services for government online

Digital Britain One: Shared infrastructure and services for government online REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 1589 SESSION 2010 2012 9 DECEMBER 2011 Cross government Digital Britain One: Shared infrastructure and services for government online 4 Key facts Digital

More information

McAfee Security Architectures for the Public Sector

McAfee Security Architectures for the Public Sector White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed

More information

Digital Marketplace - G-Cloud

Digital Marketplace - G-Cloud Digital Marketplace - G-Cloud CRM Services Core offer 9 services in this area: 1. Dynamics CRM Upgrade Services Utilising this service, Core will undertake an evaluation of your current CRM platform. We

More information

4net Technologies. Managed Services and Cloud Solutions

4net Technologies. Managed Services and Cloud Solutions 4net Technologies Managed Services and Cloud Solutions Managed Services and Cloud Solutions Managed Services and Cloud Solutions are an opportunity for organisations to bring control to complexity by managing

More information

Service Definition Document Microsoft Dynamics CRM Training

Service Definition Document Microsoft Dynamics CRM Training Service Definition Document Microsoft Dynamics CRM Training Date: 1 April 2014 Issued by: Matt Broomhall Head of Sales and Marketing Y: Name Tisski Limited: +44 (0) 203 418 0411 E: matt.broomhall@tisski.com

More information

Cloud ERP. Scalable management for global resources

Cloud ERP. Scalable management for global resources Cloud ERP Scalable management for global resources The substance behind cloud technology For many businesses the task of managing the complex network of resources across geographical boundaries, cultures,

More information

Digital Continuity Plan

Digital Continuity Plan Digital Continuity Plan Ensuring that your business information remains accessible and usable for as long as it is needed Accessible and usable information Digital continuity Digital continuity is an approach

More information

Simplify SSL Certificate Management Across the Enterprise

Simplify SSL Certificate Management Across the Enterprise WHITE PAPER White Paper Simplify SSL Certificate Management Across the Enterprise Simplify SSL Certificate Management Across the Enterprise Contents introduction 1 A Platform for Single-Point Control and

More information

See What's Coming in Oracle Service Cloud

See What's Coming in Oracle Service Cloud See What's Coming in Oracle Service Cloud May 2015 Capabilities and Benefits - Release Content Document ORACLE SERVICE CLOUD MAY RELEASE OVERVIEW This latest release of Oracle Service Cloud provides significant

More information

The trusted technology partner in the Public Sector

The trusted technology partner in the Public Sector The trusted technology partner in the Public Sector www.exponential-e.com/public-sector About Exponential-e Market Leaders in Technical Innovation GovConnect: The Exponential-e public sector service portfolio

More information

G-CLOUD 7 - VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS)

G-CLOUD 7 - VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS) G-CLOUD 7 - VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS) Service Definition 6th October 2015 TABLE OF CONTENTS VIRTUAL ASSET MANAGER (VAM) SPECIALIST CLOUD SERVICES (SCS) 3 SERVICE SUMMARY

More information

Simplify SSL Certificate Management Across the Enterprise

Simplify SSL Certificate Management Across the Enterprise Simplify SSL Certificate Management Across the Enterprise Simplify SSL Certificate Management Across the Enterprise Introduction The need for SSL certificates has moved well beyond the Buy page to core

More information

Enterprise Mobility Empowered by Logicalis / Cisco / Citrix

Enterprise Mobility Empowered by Logicalis / Cisco / Citrix 1 The vitality of your business depends on enterprise mobility. The way we work has changed. So has the way your workers work. Mobile technology now touches almost every aspect of our daily lives. From

More information

Standard 1. Governance for Safety and Quality in Health Service Organisations. Safety and Quality Improvement Guide

Standard 1. Governance for Safety and Quality in Health Service Organisations. Safety and Quality Improvement Guide Standard 1 Governance for Safety and Quality in Health Service Organisations Safety and Quality Improvement Guide 1 1 1October 1 2012 ISBN: Print: 978-1-921983-27-6 Electronic: 978-1-921983-28-3 Suggested

More information

The South Staffordshire and Shropshire Health Care NHS Foundation Trust Digital Strategy 2014 2019

The South Staffordshire and Shropshire Health Care NHS Foundation Trust Digital Strategy 2014 2019 The South Staffordshire and Shropshire Health Care NHS Foundation Trust Digital Strategy 2014 2019 Peter Kendal Associate Director for Information Management and Technology Development 01/12/2014 1 Page

More information

THE UK S LEADING HEALTHCARE RECRUITMENT GROUP MANAGED SERVICES SOLUTIONS

THE UK S LEADING HEALTHCARE RECRUITMENT GROUP MANAGED SERVICES SOLUTIONS THE UK S LEADING HEALTHCARE RECRUITMENT GROUP MANAGED SERVICES SOLUTIONS CONTENTS INTRODUCTION OUR SERVICES THE PLACEMENT GROUP COMPANIES MANAGED SERVICES BESPOKE RECRUITMENT SOLUTIONS IMPLEMENTATION NHS

More information

The Software Experts. Software Asset Management Services & Solutions

The Software Experts. Software Asset Management Services & Solutions The Software Experts Software Asset Management Services & Solutions one WORLD CLASS SOFTWARE ASSET MANAGEMENT Make Optimised IT Simple Simplify the management of IT assets and minimise financial, legal

More information

D-G4-L4-025 Mobile Working Technology Feasibility Study for a Healthcare Body Deloitte LLP Service for G-Cloud IV

D-G4-L4-025 Mobile Working Technology Feasibility Study for a Healthcare Body Deloitte LLP Service for G-Cloud IV D-G4-L4-025 Mobile Working Technology Feasibility Study for a Healthcare Body Deloitte LLP Service for G-Cloud IV September 2013 Contents 1 Service Overview 1 2 Detailed Service Description 2 3 Commercials

More information

Qlik UKI Consulting Services Catalogue

Qlik UKI Consulting Services Catalogue Qlik UKI Consulting Services Catalogue The key to a successful Qlik project lies in the right people, the right skills, and the right activities in the right order www.qlik.co.uk Table of Contents Introduction

More information

Securing the Cloud through Comprehensive Identity Management Solution

Securing the Cloud through Comprehensive Identity Management Solution Securing the Cloud through Comprehensive Identity Management Solution Millie Mak Senior IT Specialist What is Cloud Computing? A user experience and a business model Cloud computing is an emerging style

More information

Performance Management Consultancy

Performance Management Consultancy Performance Management Consultancy Facilitating performance improvements through an effective performance management process What are the challenges? While every organisation has performance management

More information

HP Software as a Service

HP Software as a Service HP Software as a Service Software Version: 6.1 Federated SSO Document Release Date: August 2013 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty

More information

Asset Management. Enabling effective estates strategies >

Asset Management. Enabling effective estates strategies > Asset Management Enabling effective estates strategies Enabling effective estates strategies In these challenging times, we help our clients deliver strategies that contribute to the overall performance

More information

IBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services. Combine resources for one complete online business security solution.

IBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services. Combine resources for one complete online business security solution. IBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services Combine resources for one complete online business security solution. Big e-business opportunities demand security to match

More information

HMG Security Policy Framework

HMG Security Policy Framework HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of

More information

The Importance of Software Management: How Rationalizing Assets Creates Real Business Benefits

The Importance of Software Management: How Rationalizing Assets Creates Real Business Benefits The Importance of Software Management: How Rationalizing Assets Creates Real Business Benefits IT As a Strategic Business Driver As the world has become more connected and employee and customer demands

More information

City and County of Swansea. Human Resources & Workforce Strategy 2013-2017. Ambition is Critical 1

City and County of Swansea. Human Resources & Workforce Strategy 2013-2017. Ambition is Critical 1 City and County of Swansea Human Resources & Workforce Strategy 2013-2017 Ambition is Critical 1 Delivering quality services for a safer, greener, smarter, fairer, healthier, richer Swansea Executive Summary

More information

Access Governance. Delivering value. What you gain. Putting a project back on track for success

Access Governance. Delivering value. What you gain. Putting a project back on track for success What you gain Risk-managed access Having a second line of defence to identify what needs to be controlled and who owns it lowers your operational costs, while taking a risk-based approach ensures greater

More information

Shared and Managed Services & Systems. Delivering organisational efficiencies with innovative solutions

Shared and Managed Services & Systems. Delivering organisational efficiencies with innovative solutions Shared and Managed Services & Systems Delivering organisational efficiencies with innovative solutions We are getting a cost-effective solution from a proven supplier. Capita IB Solutions understands our

More information

NSF-DBA Medical Device Diploma. Learning through doing with experts at your side

NSF-DBA Medical Device Diploma. Learning through doing with experts at your side NSF-DBA Medical Device Diploma Learning through doing with experts at your side Medical Device Diploma The Medical Device Diploma Learning through doing with experts at your side NSF-DBA launch a ground

More information

cloud accounting FACTS AND FICTION

cloud accounting FACTS AND FICTION cloud accounting FACTS AND FICTION WHAT IS THE CLOUD? Everyone has heard of the cloud but many people are still unsure of what it is and how it works. Cloud computing is simply when data and programmes

More information

Information Services Strategy 2011-2013

Information Services Strategy 2011-2013 Information Services Strategy Issue 1 1 Introduction The States of Jersey public sector is facing significant pressure for efficiencies and savings. This has created the context to take a fresh look at

More information

MICROSOFT DYNAMICS CRM

MICROSOFT DYNAMICS CRM MICROSOFT DYNAMICS CRM SERVICE DEFINITION G-CLOUD Commercial-in-Confidence civil.lockheedmartin.co.uk SECTION 1 LOCKHEED MARTIN S MICROSOFT DYNAMICS CRM CAPABILITY INTRODUCTION Lockheed Martin offers a

More information

SHAREPOINT SERVICE DEFINITION. G-CLOUD Commercial-in-Confidence. civil.lockheedmartin.co.uk

SHAREPOINT SERVICE DEFINITION. G-CLOUD Commercial-in-Confidence. civil.lockheedmartin.co.uk SHAREPOINT SERVICE DEFINITION G-CLOUD Commercial-in-Confidence civil.lockheedmartin.co.uk SECTION 1 LOCKHEED MARTIN S SHAREPOINT CAPABILITY Lockheed Martin offers a full end to end service, delivering

More information

Job Description. Supply Chain Development Manager

Job Description. Supply Chain Development Manager Job Description Job Title: Commercial Analyst Post Number(s) Grade: PO5 Department: Section: Reports to: Supply Chain Management Supply Chain Development Hub Supply Chain Development Manager PURPOSE OF

More information

Everything you need for your mobile enterprise

Everything you need for your mobile enterprise Everything you need for your mobile enterprise A complete software, hardware and managed service solution for mobile workers Spirit Data Capture Limited is an enterprise mobility company. We have an in-depth

More information

Invest in your business with Ubuntu Advantage.

Invest in your business with Ubuntu Advantage. Invest in your business with Ubuntu Advantage. Expert advice. Specialist tools. Dedicated support. Introducing Ubuntu Advantage Contents 02 Introducing Ubuntu Advantage 03 Ubuntu Advantage 04 - Landscape

More information

G-Cloud Service Definition. Atos Data Quality Audit SCS

G-Cloud Service Definition. Atos Data Quality Audit SCS G-Cloud Service Definition Atos Data Quality Audit SCS Atos Data Quality Audit SCS As organisations increasingly utilise a hybrid of Legacy and Cloud based technology platforms, it becomes increasingly

More information

G Cloud III Framework Lot 4 (SCS) Project Management

G Cloud III Framework Lot 4 (SCS) Project Management G Cloud III Framework Lot 4 (SCS) Project Management Contents Executive Summary 3 Project Management 4 Why Deloitte? 6 SFIA Rate Card 7 Contact 8 Service Definition (a) to (p) 9 Executive Summary PROJECT

More information

DOCUMATION S CREDIT CARD STATEMENT PROCESSING

DOCUMATION S CREDIT CARD STATEMENT PROCESSING Documation is a leading provider of document-centric workflow and content management software, delivering services and solutions to businesses and organisations in the UK, Europe and around the world.

More information

Development of Enterprise Applications for a Mobile Workforce. 23 September 2013

Development of Enterprise Applications for a Mobile Workforce. 23 September 2013 Development of Enterprise Applications for a Mobile Workforce 23 September 2013 TABLE OF CONTENTS 1 Service Overview... 3 2 Why Capgemini... 3 3 The Capgemini Proposition... 4 3.1 Approach... 4 4 Benefits...

More information

Introduction to SAML

Introduction to SAML Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments

More information

Developing Shared Services in The Public Sector

Developing Shared Services in The Public Sector Developing Shared Services in The Public Sector How to develop and manage an accountable shared IT infrastructure that creates value and reduces cost Contents page Introduction 03 1. Focus on value creation

More information

Audit Management. service definition document

Audit Management. service definition document Audit Management service definition document Contents Introduction... 3 Service Description... 3 Features and Benefits... 4 Architecture... 5 Service Delivery... 6 Service Provisioning Time... 7 Service

More information

IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Connect Renfrewshire

Connect Renfrewshire How the council will use its information and technology assets to achieve successful change Contents Strategy Context 2 Digital Delivery and Citizen Engagement 4 Operational Excellence and Transformation

More information

IT Enterprise Services

IT Enterprise Services IT Enterprise Services Local government Empowering people through technology Your drive to transform Your drive to transform Modernising local government services is high on everyone s agenda. Innovation

More information

The Danwood Group Professional Services Offering DANWOOD

The Danwood Group Professional Services Offering DANWOOD The Danwood Group Professional Services Offering DANWOOD Our Professional Services Our Professional Services department can provide you with a variety of services from Audit and Assessment to Technical

More information

Security Services. Benefits. The CA Advantage. Overview

Security Services. Benefits. The CA Advantage. Overview PRODUCT BRIEF: CA SITEMINDER FEDERATION SECURITY SERVICES CA SiteMinder Federation Security Services CA SITEMINDER FEDERATION SECURITY SERVICES EXTENDS THE WEB SINGLE SIGN-ON EXPERIENCE PROVIDED BY CA

More information

DOCUMATION S TRAVEL & EXPENSES

DOCUMATION S TRAVEL & EXPENSES Documation is a leading provider of document-centric workflow and content management software, delivering services and solutions to businesses and organisations in the UK, Europe and around the world.

More information

Our skilled and experienced Helpdesk forms the foundation of knowledge and insight for your business

Our skilled and experienced Helpdesk forms the foundation of knowledge and insight for your business Our skilled and experienced Helpdesk forms the foundation of knowledge and insight for your business 1 No matter how big or small the problem, we get the right person to you, so that you can carry on doing

More information

Human Resource Management Flexible, configurable and easy to use

Human Resource Management Flexible, configurable and easy to use Human Resource Flexible, configurable and easy to use Candidate Selection, Credentials, On Boarding, Develop, Performance, Competency, Health & Safety, Retention, salary Replacement, Qualifications, Induction,

More information

HR.net. HR.net. Human Resource Management Flexible, configurable and easy to use

HR.net. HR.net. Human Resource Management Flexible, configurable and easy to use HR.net HR.net Human Resource Management Flexible, configurable and easy to use Candidate Selection, Credentials, On Boarding, Develop, Performance, Competency, Health & Safety, Retention, Replacement,

More information

J U L Y 2 0 1 2. Title of Document. Here is the subtitle of the document

J U L Y 2 0 1 2. Title of Document. Here is the subtitle of the document J U L Y 2 0 1 2 Title of Document Here is the subtitle of the document Introduction to OpenText Protect Premier Anywhere Deploying and maintaining advanced Enterprise Information Management (EIM) solutions

More information

G-Cloud Software as a Service Service Definition

G-Cloud Software as a Service Service Definition G-Cloud Software as a Service Service Definition Nexus Visio Pro for Office 365 Reference Number RM1557vii Commercial in Confidence Document Control COPYRIGHT Copyright @ 2015 Nexus Open Systems Ltd. All

More information

Application Value Assessment

Application Value Assessment Value Assessment Journey to Realising the Value of an Organisation s Portfolio Fujitsu UK & Ireland - Business & Services By Chris Waite, Fujitsu Businesses today operate in highly competitive environments

More information

Security Consultants / Security Managed Services

Security Consultants / Security Managed Services Security Consultants / Security Managed Services Service Definition Document for G-Cloudv7 Services October 2015 Table of Contents Service Overview...3 Our Approach... 3 Features... 3 Benefits... 4 ON-BOARDING

More information

Technology in Business Fast Stream Graduate Programme

Technology in Business Fast Stream Graduate Programme Technology in Business Fast Stream Graduate Programme 02 Contents Welcome p.03 What is the Technology in Business Fast Stream? p.04 What are we looking for? p.06 Your Fast Stream career path p.08 Profiles

More information

Provide access control with innovative solutions from IBM.

Provide access control with innovative solutions from IBM. Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business

More information

How To Train Your Marketing Team In Microsoft Dynamics Crm

How To Train Your Marketing Team In Microsoft Dynamics Crm MICROSOFT DYNAMICS CRM Training your marketing team Increase the effectiveness of your campaigns, build a 360 degree view of your customers and get results Contents Introduction CRM Training With Tisski

More information

Managed Mobility from O 2

Managed Mobility from O 2 Secure, managed, flexible working From network connectivity, to secure device management and custom apps our Managed Mobility solutions provide everything you need. Release your workforce and support their

More information

We needed more flexibility and one source of truth. At a glance. XMPro orchestrates grant management at. Catholic Education Commission NSW

We needed more flexibility and one source of truth. At a glance. XMPro orchestrates grant management at. Catholic Education Commission NSW CASE STUDY XMPRO At a glance Organisation Catholic Education Commission NSW (CEC NSW) Industry Education Location Sydney, NSW Challenges: Existing IT architecture and software had grown organically and

More information

Citizens Advice Response to DECC s Consultation on the timing of the review of the Data Access and Privacy Framework

Citizens Advice Response to DECC s Consultation on the timing of the review of the Data Access and Privacy Framework Citizens Advice Response to DECC s Consultation on the timing of the review of the Data Access and Privacy Framework Introduction The Citizens Advice service provides free, independent, confidential and

More information

Ubertas Cloud Services: Service Definition

Ubertas Cloud Services: Service Definition Ubertas Cloud Services: Service Definition February 2013 Innovation. Power. Trust. Contents 1. About Ubertas... 2 Our Company... 2 Our Approach to Service Delivery... 2 Our Partner Network & the UK Cloud

More information

Cloud Computing in a Regulated Environment

Cloud Computing in a Regulated Environment Computing in a Regulated Environment White Paper by David Stephenson CTG Regulatory Compliance Subject Matter Expert February 2014 CTG (UK) Limited, 11 Beacontree Plaza, Gillette Way, READING, Berks RG2

More information

Hosting and data centre services

Hosting and data centre services Hosting and data centre services Who is Equiniti? Equiniti is a specialist provider of IT services, delivering bespoke solutions to over 2,200 clients in the public and private sectors. Our expertise is

More information

TOWARDS AN ARCHITECTURE FOR A DIGITAL BLUE BADGE SERVICE

TOWARDS AN ARCHITECTURE FOR A DIGITAL BLUE BADGE SERVICE TOWARDS AN ARCHITECTURE FOR A DIGITAL BLUE BADGE SERVICE The findings of an Alpha Project involving GDS DWP White Paper By Ian Litton and Rob Laurence Executive Summary The Government Digital Strategy

More information

Rethinking Cloud Content Collaboration in Financial Services

Rethinking Cloud Content Collaboration in Financial Services Rethinking Cloud Content Collaboration in Financial Services Executive Summary The financial services sector generally prefers to take a risk-averse approach to new technology trends, with the need for

More information

Understanding The Benefits Of Unified Communications And Hosted VoIP

Understanding The Benefits Of Unified Communications And Hosted VoIP Understanding The Benefits Of Unified Communications And Hosted VoIP oip Having Unified Communications (UC) in place can benefit not only your organisations but also your employees and customers. The Benefits

More information